Blogs

About this blog

Welcome to the Business Service Management Blog, where you can read the perspectives from BSM experts. This Blog provides insights into the BSM solution, as well as technical details about specific IBM products.

Recent tweets

In this short video, you will see how quickly we get value from Tivoli's Application Performance Management portfolio managing an SAP environment. We will focus on understanding our end user's response times. We will diagnose and repair a problem that affects the performance of the SAP application. We will look at end user response times, then availability and performance metrics for the client, transaction, server, and application to determine root cause of a perceived end user response issue. <<... [More]

For the latest updates on operating system requirements, see Overview and
Planning in the TBSM Developer Works Wiki at: TBSM developerWorks wiki Updates on Feb 29, 2012 Add note that on Red Hat Enterprise Linux 5 You must disable SELinux or the TBSM 6.1 installation will fail Added link to the WebSphere® Application Server topic that describes how to prepare Linux systems for installation. TBSM is built on the WebSphere® Application Server.

This is Part 2 of a series I am writing
on Tivoli Common Reporting (TCR) integration with Tivoli Application
Dependency Discovery Manager (TADDM). Part 1 of the series focused
on why you would choose to
deploy TCR with TADDM. You can read Part 1 of th is series here:
TADDM
and TCR: Consuming data from TADDM As noted in Part 1, this will be a
three part series entailing: Part 1: Consuming Data from TADDM --
What are the options and why would you deploy and use TCR. Part 2: Deploying TCR and integrating
with TADDM Part 3: Writing... [More]

http://www.cloud-council.org/press-release/02-07-12.htm . The CSCC (http://www.cloud-council.org/) has launched a working group focused on Security in the Cloud. With security identified as one of the top areas of concern from cloud adopters, the working group will develop use cases keying on the security issues. The scope of the working group covers, but is not limited to private, public and hybrid clouds. Some of the initial areas to be addressed are identity and access management (IAM), security policy, audit and compliance, trust, data... [More]